Skip to content

Commit 1ebb4b0

Browse files
committed
Rewording 'an origin's process'.
1 parent 00ccca5 commit 1ebb4b0

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

index.bs

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,8 @@ Spectre-like side-channel attacks inexorably lead to a model in which active web
190190
has entered the address space of the process which hosts it. While this has deep implications for
191191
user agent implementations' internal hardening strategies (stack canaries, ASLR, etc), here we'll
192192
remain focused on the core implication at the web platform level, which is both simple and profound:
193-
any data which flows into an origin's process is legible to that origin. We must design accordingly.
193+
any data which flows into a process hosting a given origin is legible to that origin. We must design
194+
accordingly.
194195

195196
In order to determine the scope of data that can be assumed accessible to an attacker, we must make
196197
a few assumptions about the normally-not-web-exposed process model which the user agent implements.
@@ -202,8 +203,8 @@ The following seems like a good place to start:
202203
invisible to any process potentially hosting untrusted code.
203204

204205
2. User agents are able to make decisions about whether or not a given resource should be delivered
205-
to an origin's process based on characteristics of both the request and the response (headers,
206-
etc).
206+
to a process hosting a given origin based on characteristics of both the request and the
207+
response (headers, etc).
207208

208209
3. User agents can consistently separate top-level, cross-origin windows into distinct processes.
209210
They cannot consistently separate same-site or same-origin windows into distinct processes given

index.html

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1486,7 +1486,7 @@
14861486
</style>
14871487
<meta content="Bikeshed version c5172e83, updated Fri Nov 20 15:35:20 2020 -0800" name="generator">
14881488
<link href="https://mikewest.github.io/post-spectre-webdev/" rel="canonical">
1489-
<meta content="f1728a156b2f6e79f81ad195d69497cb48927e2a" name="document-revision">
1489+
<meta content="00ccca50d4a466befbe24ffec0f800a75176244a" name="document-revision">
14901490
<style>/* style-autolinks */
14911491

14921492
.css.css, .property.property, .descriptor.descriptor {
@@ -2043,7 +2043,7 @@
20432043
<div class="head">
20442044
<p data-fill-with="logo"></p>
20452045
<h1 class="p-name no-ref" id="title">Post-Spectre Web Development</h1>
2046-
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-24">24 February 2021</time></span></h2>
2046+
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-25">25 February 2021</time></span></h2>
20472047
<div data-fill-with="spec-metadata">
20482048
<dl>
20492049
<dt>This version:
@@ -2058,7 +2058,7 @@ <h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="cont
20582058
<div data-fill-with="warning"></div>
20592059
<p class="copyright" data-fill-with="copyright"><a href="http://creativecommons.org/publicdomain/zero/1.0/" rel="license"><img alt="CC0" src="https://licensebuttons.net/p/zero/1.0/80x15.png"></a> To the extent possible under law, the editors have waived all copyright
20602060
and related or neighboring rights to this work.
2061-
In addition, as of 24 February 2021,
2061+
In addition, as of 25 February 2021,
20622062
the editors have made this specification available under the <a href="http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0" rel="license">Open Web Foundation Agreement Version 1.0</a>,
20632063
which is available at http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0.
20642064
Parts of this work may be from another specification document. If so, those parts are instead covered by the license of that specification document. </p>
@@ -2141,7 +2141,8 @@ <h3 class="heading settled" data-level="1.1" id="threat-model"><span class="secn
21412141
has entered the address space of the process which hosts it. While this has deep implications for
21422142
user agent implementations' internal hardening strategies (stack canaries, ASLR, etc), here we’ll
21432143
remain focused on the core implication at the web platform level, which is both simple and profound:
2144-
any data which flows into an origin’s process is legible to that origin. We must design accordingly.</p>
2144+
any data which flows into a process hosting a given origin is legible to that origin. We must design
2145+
accordingly.</p>
21452146
<p>In order to determine the scope of data that can be assumed accessible to an attacker, we must make
21462147
a few assumptions about the normally-not-web-exposed process model which the user agent implements.
21472148
The following seems like a good place to start:</p>
@@ -2153,8 +2154,8 @@ <h3 class="heading settled" data-level="1.1" id="threat-model"><span class="secn
21532154
invisible to any process potentially hosting untrusted code.</p>
21542155
<li data-md>
21552156
<p>User agents are able to make decisions about whether or not a given resource should be delivered
2156-
to an origin’s process based on characteristics of both the request and the response (headers,
2157-
etc).</p>
2157+
to a process hosting a given origin based on characteristics of both the request and the
2158+
response (headers, etc).</p>
21582159
<li data-md>
21592160
<p>User agents can consistently separate top-level, cross-origin windows into distinct processes.
21602161
They cannot consistently separate same-site or same-origin windows into distinct processes given

0 commit comments

Comments
 (0)